LogoLogo
Ctrlk
Try Pentaho! - Start your 30 day evaluation today
  • Pentaho Documentation
  • Administer Pentaho Data Integration and Analytics 11.0
    • Manage the Pentaho system
    • Secure the Pentaho system
      • User security
      • Big data security
        • Kerberos authentication versus secure impersonation
          • How to enable secure impersonation
          • How to enable Kerberos authentication
          • Prerequisites
          • Supported components
        • Pentaho and CDP security
    • Optimize the Pentaho system
    • Troubleshoot the Pentaho system
    • Developer center
    • platform-javascript-apis
    • Customize Pentaho products
    • Embed and extend Pentaho functionality
Powered by GitBook
On this page
  1. Administer Pentaho Data Integration and Analytics 11.0
  2. Secure the Pentaho system
  3. Big data security

Kerberos authentication versus secure impersonation

How to enable secure impersonationHow to enable Kerberos authenticationPrerequisitesSupported components
PreviousBig data securityNextHow to enable secure impersonation

Last updated 5 months ago

Was this helpful?

LogoLogo

About

  • Pentaho.com

Support

  • Pentaho Support

Resources

  • Privacy

© 2025 Hitachi Vantara LLC

Was this helpful?